摘要:
Protection of real-time data such as voice data exchanged as packets between a mobile electronic device and a VPN gateway during a media session over a communications link that includes a wireless network. A first VPN connection is established between the mobile electronic device and the VPN gateway through the communications link, the first VPN connection using key-based encryption to protect data exchanged therethrough. While the first VPN connection is established, a second VPN connection is established between the mobile electronic device and the VPN gateway through the communications link, the second VPN connection using key-based encryption to protect data exchanged therethrough. Real-time data packets are exchanged between the mobile electronic device and the VPN gateway through the second VPN connection.
摘要:
Systems and methods for processing messages within a wireless communications system are disclosed. At least part of an encrypted message is received at a device for which it is intended. A security indicator on the device indicates that a message is encrypted. The message is decrypted, and it is determined whether the decrypted message includes a logical attachment. If there is such a logical attachment, an attachment indicator on the device indicates that the encrypted message includes an attachment associated with the message independent of the encryption attachment itself. The indicators may be updated via direct user action, or transparently and free from direct user input to said device.
摘要:
A system and method of selecting messaging settings on a messaging client are provided. A data store configured to operate in conjunction with the messaging client stores records comprising messaging settings or characteristics for previously received and/or sent messages. The messaging client is configured to send outgoing messages, each of the messages having message characteristics, to determine whether a record for an addressed recipient of an outgoing message exists in the data store, and to select messaging settings to control the message characteristics of the outgoing message based on the record where a record exists.
摘要:
Preferred embodiments of the invention relate to a method and device for authenticating a user of a computer and a corresponding system using the method and device. The device is a handheld electronic device having accessible thereto a first authentication code of the user. The handheld electronic device requires a second authentication code for enabling use thereof. In order to authenticate the user to the computer, the handheld electronic device is configured to transmit the first authentication code to the computer over a communication link between the computer and the handheld electronic device.
摘要:
Systems, devices, and methods for outputting an alert on a mobile device to indicate the use of a weak hash function are disclosed herein. In one example embodiment, the method comprises receiving data (e.g. from a server) that identifies at least one first hash function, identifying a hash digest generated using a second hash function, determining if the second hash function is weak using the received data, and outputting an alert indicating that the second hash function is weak if it is determined that the second hash function is weak.
摘要:
Systems and methods for processing encoded messages within a wireless communications system are disclosed. A server within the wireless communications system performs signature verification of an encoded message and provides, together with the message, an indication to the mobile device that the message has been verified. In addition, the server provides supplemental information, such as, for example, a hash of the certificate or certificate chain used to verify the message, to the device, to enable the device to perform additional checks on the certificate, such as, for example, validity checks, trust checks, strength checks, or the like.
摘要:
A method is provided for reducing a number of keys that a user is required to depress on a device having a keyboard with a limited number of keys when the user enters a password. The method comprising the following steps. A subset of characters used to define the password is determined. A filter to apply to the keyboard is determined in accordance with the determined subset of characters. The filter is applied when the user depresses the keys. Devices and computer readable medium for implementing the method are also provided.
摘要:
A system and method for provisioning a primary mobile device from a secondary mobile device, including storing at the secondary mobile device provisioning data for the primary mobile device, the provisioning data including information used by the primary mobile device for communicating over a wireless network; establishing a direct wireless communications link between the secondary mobile device and the primary mobile device; and sending the provisioning data over the communications link from the secondary mobile device to the primary mobile device and storing the provisioning data at the primary mobile device.
摘要:
The present disclosure relates generally to the authentication of contactless payments attempted by a device having embedded contactless payment functionality. In particular, the disclosure is directed to systems and methods that utilize authentication schemes that already exist on a device in which the contactless payment functionality is embedded. One example of such authentication schemes is the use of password protection to lock or unlock the device in which the contactless payment functionality is embedded. Using the password protection functionality may provide varying levels of authentication protection based on the desires of the user. A number of exemplary uses of such a method and apparatus are disclosed herein.
摘要:
A system and method for implementing an SMBus/I2C interface in a computer connectable to a network. The system includes a plurality of devices communicably coupled to an SMBus. The system operates at a first clock rate when the system is awake, and at a second clock rate less than the first clock rate when the system is sleeping. At least when the system is sleeping, a first device stores data transferred via the SMBus in a register, and a second device drives the clock line of the SMBus to a low logic level while the data is stored in the register of the first device. Upon completion of the data transfer operation, the first device clears the data from the register, and the second device releases the clock line to allow it to be pulled-up by pull-up circuitry connected to the SMBus.
摘要翻译:一种用于在可连接到网络的计算机中实现SMBus / I 2 C接口的系统和方法。 该系统包括可通信地耦合到SMBus的多个设备。 当系统清醒时,系统以第一时钟速率工作,并且在系统正在休眠时以第一时钟速率小于第一时钟速率。 至少当系统正在休眠时,第一设备将经由SMBus传送的数据存储在寄存器中,并且第二设备将SMBus的时钟线驱动到低逻辑电平,同时将数据存储在第一设备的寄存器中。 完成数据传输操作后,第一个设备从寄存器中清除数据,第二个设备释放时钟线,以允许其通过与SMBus相连的上拉电路进行上拉。